Based on the assigned chapters and presentations. Robert Taylor ( CHAPTER 2) explained computer crimes by presenting four categories. Considering the presentations of cybertips and human trafficking investigations, which of Taylors categories do those investigations fit? Or do the crimes discussed fit into all categories?